Part 1 of 1 – 100.0 PointsQuestion 1 of 20
5.0 Points
Which of the following tools allows database password cracking, ARP poisoning, enumeration, and sniffing A.Wireshark
B.Nemesis
C.Etherape
Correct D.Cain Answer Key: D
Question 2 of 20
5.0 Points
Which sniffer tool is designed to intercept and reveal passwords A.Windump
Correct B.Dsniff
C.Wireshark
D.All of the above Answer Key: B
Question 3 of 20
5.0 Points
Which of the following is a tool used for sniffing A.Hunt
Correct B.Tcpdump
C.Nemesis
D.SMAC Answer Key: B
Question 4 of 20
5.0 Points
Sniffing can be used to ___________.
A.troubleshoot connections
B.investigate malware
C.detect abnormal behavior
Correct D.All of the above Answer Key: D
Question 5 of 20
5.0 Points
Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services A.Passive session hijacking
B.Active session hijacking
Correct C.Denial of Service
D.Covert channel Answer Key: C
Question 6 of 20
5.0 Points
Which of the following attacks sends out bogus requests to any requesting device and the switch A.Spoofing
B.Flooding
Correct C.Poisoning
D.Hijacking Answer Key: C
Question 7 of 20
5.0 Points
Which of the following protocols is not easily sniffed A.SMTP
B.HTTP
Correct C.SSH
D.Telnet Answer Key: C
Question 8 of 20
5.0 Points
Which of the following is an attack that actively injects packets into the network with the goal of disrupting and taking over an existing session on the network A.Sniffing
Correct B.Hijacking
C.Denial of service
D.Covert channel Answer Key: B
Question 9 of 20
5.0 Points
Which of the following takes place on networks such as those that have a hub as the connectivity deviceCorrect A.Passive sniffing
B.Promiscuous sniffing
C.Active sniffing
D.Switched sniffing Answer Key: A…

ISSC362 Week 5 Quiz